Please use this identifier to cite or link to this item:
http://dspace.azjhpc.org/xmlui/handle/123456789/42
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Suleymanzade, Suleyman | - |
dc.date.accessioned | 2023-04-28T20:05:34Z | - |
dc.date.available | 2023-04-28T20:05:34Z | - |
dc.date.issued | 2020-06 | - |
dc.identifier.issn | 2616-6127 | - |
dc.identifier.issn | 2617-4383 | - |
dc.identifier.other | https://doi.org/10.32010/26166127.2020.3.1.46.53 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/42 | - |
dc.description.abstract | During history, retrieval systems become more complicated in their architecture design and work principles. The system that gathers text and visual data from the internet must classify the data and store it as the set of metadata. The modern AI classifiers that are used in retrieval systems might be tricked by skilled intruders who use adversarial attacks on the retrieval system. The goal of this paper is to review different strategies of attacks and defenses, describe state-of-the-art methods from both sides, and show how important the development of HPC is in protecting systems. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Azerbaijan Journal of High Performance Computing | en_US |
dc.subject | adversarial attacks | en_US |
dc.subject | retrieval systems | en_US |
dc.subject | FGSM | en_US |
dc.subject | PGD | en_US |
dc.subject | HPC | en_US |
dc.title | DEFENDING STRATEGIES AGAINST ADVERSARIAL ATTACKS IN RETRIEVAL SYSTEMS | en_US |
dc.type | Article | en_US |
dc.source.journaltitle | Azerbaijan Journal of High Performance Computing | en_US |
dc.source.volume | 3 | en_US |
dc.source.issue | 1 | en_US |
dc.source.beginpage | 46 | en_US |
dc.source.endpage | 53 | en_US |
dc.source.numberofpages | 8 | en_US |
Appears in Collections: | Azerbaijan Journal of High Performance Computing |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
doi.org.10.32010.26166127.2020.3.1.46.53.pdf | 611.55 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.